• Corpus ID: 107932142

PROTECTING ANTI-VIRUS SOFTWARE UNDER VIRAL ATTACKS

@inproceedings{Srinivasan2007PROTECTINGAS,
  title={PROTECTING ANTI-VIRUS SOFTWARE UNDER VIRAL ATTACKS},
  author={Raghunathan Srinivasan},
  year={2007}
}
In a wobbler, an elongate cavity has an end portion divided in two side chambers by a longitudinal partition wall in a plane at right angles to the spoon of the wobbler. At the end of the partition wall a weight-loaded flap slopes in one direction or the other depending on the twist position of the wobbler. One or more balls roll back and forth in the cavity and side chambers. When in one side chamber the balls twist the wobbler to steer out to one side and with the balls in the other side… 
BEHAVIORAL AND PERFORMANCE ANALYSIS MODEL FOR MALWARE DETECTION TECHNIQUES
TLDR
“False Positive” when an uninfected object (file, sector or system memory) triggers the anti-virus program, the opposite term “False Negative” means that an infected object arrived undetected.
Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools
TLDR
In this paper, it is demonstrated that the proposition of using Malware resilient designs can be applied to harden the tools through experiments.
IDENTIFICATION OF HETEROGENEOUS MALICIOUS NODES IN THE CRUCIAL DYNAMIC ENVIRONMENT FOR PROTECTING LOCAL AND REMOTE SYSTEMS
Computer Software applications are a heterogeneous emerging trend, third party software applications are increasing more and more today. Due to the enhancement in existing software applications, it
Computer Virus Strategies and Detection Methods
TLDR
To develop new reliable antivirus software some problems must be solved such as: a new method to detect all metamorphic virus copies, new reliable monitoring techniques to discover the new viruses or attaching a digital signature and a certificate to each new software.
Control Flow Graph Based Attacks : In the Context of Flattened Programs
TLDR
A de-obfuscation model based on the Control Flow Graph of an obfuscated program is presented, which is adequate to reverse the flattened program to its original structure and is valuable for improvements to existing code obfuscation techniques.
Hard-Detours: A new technique for dynamic code analysis
TLDR
A new technique is proposed (Hard-Detours) to perform the dynamic code analysis that intercepts the communication between the application and the system and avoids detection, removal and bypassing techniques.
WINDOWS OPERATING SYSTEM VULNERABILITIES
Computers have brought about a revolution across all industries. Computers have become the most important part for the success of any enterprise. Computers are the best means for proper storage and
A Model Checking Framework For Developing Scalable Antivirus Systems
TLDR
Preliminary results from the test runs shows that the proposed model checking framework for static malware detection is efficient at detecting viruses, Trojans, worms and unknown malicious programs.
Metamorphic Viruses Detection Using Artificial Immune System
  • E. A. Daoud
  • Computer Science
    2009 International Conference on Communication Software and Networks
  • 2009
TLDR
A new artificial immune system for metamorphic viruses detection, the suggested system uses components and techniques found in the biological immune system such as multilayer, self, nonself, skin, skeleton, B-cell and receptors.
The Computational Theory of Intelligence: Applications to Genetic Programming and Turing Machines
TLDR
The ramifications of the assumptions of CTI with regard to the qualities of reproduction and virility are considered and applications to Biology, Computer Science and Cyber Security are discussed.
...
1
2
...

References

SHOWING 1-10 OF 60 REFERENCES
The internet worm program: an analysis
TLDR
The paper contains a review of the security flaws exploited by the worm program, and gives some recommendations on how to eliminate or mitigate their future use.
Trends in Viruses and Worms
he modern computer virus was conceived and demonstrated by Fred Cohen in 1983. Like biological viruses, computer viruses reproduce by attaching to a normal program or document and taking over control
Fighting Computer Viruses
Much of their popular presence is attributable to an obvious but deep biological analogy: computer viruses replicate by attaching themselves to a host (a program or computer instead of a biological
Computer virus-antivirus coevolution
TLDR
The polymorphic virus avoids detection by mutating itself each time it infects a new program; each mutated infection is capable of performing the same tasks as its parent, yet it may look entirely different.
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
TLDR
This paper introduces a new stronger concept: dynamic signatures of viruses, and presents a method to design viruses which are static signature-free and whose dynamic signatures are hard to determine unless some cryptographic assumption fails.
SubVirt: implementing malware with virtual machines
TLDR
This paper evaluates a new type of malicious software that gains qualitatively more control over a system, which is called a virtual-machine based rootkit (VMBR), and implements a defense strategy suitable for protecting systems against this threat.
Server-assisted generation of a strong secret from a password
  • W. Ford, B. Kaliski
  • Computer Science
    Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
  • 2000
TLDR
This work describes a credentials server model and supporting protocol that overcomes the vulnerability to exhaustive password guessing attack at the server, and provides for securely generating a strong secret from a weak secret (password) based on communications exchanges with two or more independent servers.
The Art of Computer Virus Research and Defense
"Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one
Secure Password-Based Protocol for Downloading a Private Key
TLDR
Protocols that allow Alice to be stateless, avoid denial-of-service attacks, allow for salt, and are minimal in computation and number of messages are presented.
Hybrid static-dynamic attacks against software protection mechanisms
TLDR
This is one of the first scientific papers to discuss the potential of dynamic or hybrid static-dynamic attacks, through which an attacker can analyze, control and modify a program extensively.
...
1
2
3
4
5
...